General

  • Target

    INV IFL NP 22080.doc

  • Size

    1.7MB

  • Sample

    211103-xvx86seec9

  • MD5

    411bc60dedab2323705c49b657990d59

  • SHA1

    c23e28d2fb158e8fc2f3c6179702e2a980b29b54

  • SHA256

    600bf146efa51b38dceb6271a44fc4cc9bc115d280ef01700305a34b39581b17

  • SHA512

    7e5a322da1340f5da09dd6ba52fb455b1ac70b4a0e9e285b2ed37ae399e9d1991b6fd290413d9810dda28f6313b403ec751ee240f045745435af55ffbf84e23f

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

jy0b

C2

http://www.filecrev.com/jy0b/

Decoy

lamejorimagen.com

mykabukibrush.com

modgon.com

barefoottherapeutics.com

shimpeg.net

trade-sniper.com

chiangkhancityhotel.com

joblessmoni.club

stespritsubways.com

chico-group.com

nni8.xyz

searchtypically.online

jobsyork.com

bestsales-crypto.com

iqmarketing.info

bullcityphotobooths.com

fwssc.icu

1oc87s.icu

usdiesel.xyz

secrets2optimumnutrition.com

Targets

    • Target

      INV IFL NP 22080.doc

    • Size

      1.7MB

    • MD5

      411bc60dedab2323705c49b657990d59

    • SHA1

      c23e28d2fb158e8fc2f3c6179702e2a980b29b54

    • SHA256

      600bf146efa51b38dceb6271a44fc4cc9bc115d280ef01700305a34b39581b17

    • SHA512

      7e5a322da1340f5da09dd6ba52fb455b1ac70b4a0e9e285b2ed37ae399e9d1991b6fd290413d9810dda28f6313b403ec751ee240f045745435af55ffbf84e23f

    • Formbook

      Formbook is a data stealing malware which is capable of stealing data.

    • Formbook Payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Tasks